{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:55:43Z","timestamp":1725558943802},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540254119"},{"type":"electronic","value":"9783540319856"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31985-6_13","type":"book-chapter","created":{"date-parts":[[2010,7,11]],"date-time":"2010-07-11T18:53:19Z","timestamp":1278874399000},"page":"188-203","source":"Crossref","is-referenced-by-count":0,"title":["A Compiler-Based Approach to Data Security"],"prefix":"10.1007","author":[{"given":"F.","family":"Li","sequence":"first","affiliation":[]},{"given":"G.","family":"Chen","sequence":"additional","affiliation":[]},{"given":"M.","family":"Kandemir","sequence":"additional","affiliation":[]},{"given":"R.","family":"Brooks","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"13_CR1","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/BF02252866","volume":"2","author":"M. Abadi","year":"1990","unstructured":"Abadi, M., Feigenbaum, J.: Secure circuit evaluation. Journal of Cryptology\u00a02(1), 112 (1990)","journal-title":"Journal of Cryptology"},{"doi-asserted-by":"crossref","unstructured":"Amarasinghe, S.P., Anderson, J.M., Wilson, C.S., Liao, S.-W., Murphy, B.R., French, R.S., Lam, M.S., Hall, M.W.: Multiprocessors from a Software Perspective. IEEE Micro (June 1996)","key":"13_CR2","DOI":"10.1109\/40.502406"},{"doi-asserted-by":"crossref","unstructured":"Ancourt, C., Irigoin, F.: Scanning polyhedra with DO loops. In: Proceedings of the 3rd ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, pp. 39\u201350 (1991)","key":"13_CR3","DOI":"10.1145\/109625.109631"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/BFb0028165","volume-title":"Security Protocols","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Kuhn, M.G.: Low Cost Attacks on Tamper Resistant Devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 125\u2013136. Springer, Heidelberg (1998)"},{"unstructured":"Atmel Secure Memories, http:\/\/www.atmel.com\/products\/SecureMem\/","key":"13_CR5"},{"unstructured":"Collberg, C., Thomborson, C., Low, D.: A Taxonomy of obfuscating transformations. Technical Report #148, Department of Computer Science, University of Auckland (July 1997)","key":"13_CR6"},{"doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Proceedings of the 25th ACM Symposium on Principles of Pro-gramming Languages, January 1998, pp. 184\u2013196 (1998)","key":"13_CR7","DOI":"10.1145\/268946.268962"},{"unstructured":"Dhem, J.-F., Faber, E.: Built-in hardware security: smart cards and crypto-processors. Embedded tutorial. In: Proceedings of International Conference on Computer Design (2001)","key":"13_CR8"},{"doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a complete-ness theorem for protocols with honest majority. In: Proceedings of the 19th Annual ACM Symposium on Theory of Computing, New York City, May 1987, pp. 218\u2013229 (1987)","key":"13_CR9","DOI":"10.1145\/28395.28420"},{"unstructured":"Hohl, F.: An approach to solve the problem of malicious hosts. Universitaet Stuttgart Fa-kultaet Informatik, Bericht Nr. 1997\/03 (1997)","key":"13_CR10"},{"unstructured":"Infineon Technologies. Security Chips and ICs. http:\/\/www.infineon.com\/products","key":"13_CR11"},{"doi-asserted-by":"crossref","unstructured":"Jansen, W., Karygiannis, T.: Mobile agent security. NIST Special Publication 800-19 (August 1999) http:\/\/csrc.nist.gov\/mobileagents\/publication\/sp800-19.pdf","key":"13_CR12","DOI":"10.6028\/NIST.SP.800-19"},{"unstructured":"Kelly, W., Pugh, W.: A Framework for Unifying Reordering Transformations. Techni-cal Report, University of Maryland Institute for Advanced Computer Studies. Dept. of Computer Science, Univ. of Maryland (April 1993)","key":"13_CR13"},{"unstructured":"Kilpatrick, P., Crookes, D., Owens, M.: Program slicing: A computer aided program-ming technique. In: Proceedings of the Second IEEE \/ BCS Conference on Software En-gineering, pp. 602\u2013604 (1988)","key":"13_CR14"},{"doi-asserted-by":"crossref","unstructured":"Linn, C., Debray, S.: Obfuscation of wxecutable code to improve resistance to static disassembly. In: Proceedings of the 10th ACM Conference on Computer and Communication Security (October 2003)","key":"13_CR15","DOI":"10.1145\/948148.948149"},{"unstructured":"Loureiro, S.: Mobile Code Protection, Ph. D.Dissertation, Institut Eurecom (2001)","key":"13_CR16"},{"unstructured":"Loureiro, S., Bussard, L., Roudier, Y.: Extending tamper-proof hardware security to untrusted execution environments. In: Proceedings of CARDIS (2002)","key":"13_CR17"},{"unstructured":"Loureiro, S., Molva, R.: Function hiding based on error correcting codes. In: Proceedings of the International Workshop on Cryptographic Techniques and Electronic Commerce, City University of Hong-Kong, July 1999, pp. 92\u201398 (1999)","key":"13_CR18"},{"doi-asserted-by":"crossref","unstructured":"Pugh, W., Rosser, E.: Iteration space slicing and its application to communication op-timization. In: Proceedings of the International Conference on Supercomputing (1997)","key":"13_CR19","DOI":"10.1145\/263580.263637"},{"doi-asserted-by":"crossref","unstructured":"Pugh, W., Rosser, E.: Iteration space slicing for locality. In: Proceedings of Languages and Compilers for Parallel Computing (1999)","key":"13_CR20","DOI":"10.1007\/3-540-44905-1_11"},{"key":"13_CR21","first-page":"71","volume-title":"Smart Card Handbook","author":"W. Rankl","year":"1997","unstructured":"Rankl, W., Effing, W.: Smart Card Handbook, vol.\u00a0421, p. 71. John Wiley and Sons, Chichester (1997)"},{"key":"13_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-45418-7_17","volume-title":"Smart Card Programming and Security","author":"J.-J. Quisquater","year":"2001","unstructured":"Quisquater, J.-J., Samyde, D.: ElectroMagnetic analysis (EMA): Measures and counter-measures for smart cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol.\u00a02140, pp. 200\u2013210. Springer, Heidelberg (2001)"},{"doi-asserted-by":"crossref","unstructured":"Sander, T., Tschudin, C.F.: Towards mobile cryptography. In: Proceedings of the 1998 IEEE Symposium on Security and Privacy, Oakland, California, May 1998, pp. 215\u2013224 (1998)","key":"13_CR23","DOI":"10.1109\/SECPRI.1998.674837"},{"doi-asserted-by":"crossref","unstructured":"Sander, T., Tschudin, C.: On software protection via function hiding. In: Proceedings of the Second Workshop on Information Hiding, Portland, Oregon, USA (April 1998)","key":"13_CR24","DOI":"10.1007\/3-540-49380-8_9"},{"doi-asserted-by":"crossref","unstructured":"Weiser, M.: Program slicing. IEEE Transactions on Software Engineering, 352\u2013357 (July 1984)","key":"13_CR25","DOI":"10.1109\/TSE.1984.5010248"},{"key":"13_CR26","volume-title":"High Performance Compilers for Parallel Computing","author":"M. Wolfe","year":"1996","unstructured":"Wolfe, M.: High Performance Compilers for Parallel Computing. Addison-Wesley Pub-lishing Company, Reading (1996)"},{"doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: Proceedings of the IEEE Symposium on Foundations of Computer Science, Chicago, pp. 160\u2013164 (1982)","key":"13_CR27","DOI":"10.1109\/SFCS.1982.38"},{"doi-asserted-by":"crossref","unstructured":"Yao, A.C.: How to generate and exchange secrets. In: Proceedings of the IEEE Sympo-sium on Foundations of Computer Science, Toronto, pp. 162\u2013167 (1986)","key":"13_CR28","DOI":"10.1109\/SFCS.1986.25"},{"unstructured":"Yee, B.: A sanctuary for mobile agents. Technical Report CS97-537, Department of Computer Science and Engineering, UCSD (April 1997)","key":"13_CR29"},{"unstructured":"Zhang, X., Gupta, R.: Hiding Program Slices for Software Security. In: First Annual IEEE\/ACM Symposium on Code Generation and Optimization, San Francisco, CA, March 2003, pp. 325\u2013336 (2003)","key":"13_CR30"}],"container-title":["Lecture Notes in Computer Science","Compiler Construction"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31985-6_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:33:08Z","timestamp":1605760388000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31985-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540254119","9783540319856"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31985-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}